[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87888

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 11883 Download | Alert*

The host is installed with Microsoft .NET Framework 1.1 SP1 or 2.0 SP2 or 3.0 or 4 and is prone to system drawing information disclosure vulnerability. A flaw is present in the application, which fails to properly handle pointers to unmanaged memory locations. Successful exploitation allows remote attackers to install programs, view, change or delete data or create new accounts with full user righ ...

The host is installed with Microsoft .NET Framework 1.1 SP1 or 2.0 SP2 or 3.5.1 or 4 or 4.5 and is prone to WinForms buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle a Windows Forms method. Successful exploitation allows remote attackers to install programs, view, change or delete data or create new accounts with full user rights.

The host is installed with Microsoft .NET Framework 4 or 4.5 and is prone to WPF reflection optimization vulnerability. A flaw is present in the applications, which fails to properly validate permissions of objects involved with reflection. Successful exploitation allows attackers to take complete control of the affected system.

The host is installed with Microsoft .NET Framework 2.0 SP2, 3.5.1, 4 or 4.5 and is prone to Web proxy auto-discovery vulnerability. A flaw is present in the applications, which is caused by a lack of validation when the .NET Framework acquires the default web proxy settings and executes JavaScript contain within the proxy auto-configuration file. Successful exploitation allows attackers to run re ...

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle REGION records in PICT files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to memory corruption vulnerability. A flaw is present in the application, which fails to properly handle PICT files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to use after free vulnerability. A flaw is present in the application, which fails in plugin's handling of '_qtactivex_' parameters within a HTML object element. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails to properly handle the transform attribute in text3GTrack elements. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to multiple buffer overflow vulnerabilities. The flaws are present in the application, which fails to properly handle the style elements in QuickTime TeXML files. Successful exploitation could allow attackers to execute arbitrary code or crash the service.

The host is installed with Apple QuickTime before 7.7.3 and is prone to buffer overflow vulnerability. A flaw is present in the application, which fails in plugin's handling of MIME types. Successful exploitation could allow attackers to execute arbitrary code or crash the service.


Pages:      Start    1175    1176    1177    1178    1179    1180    1181    1182    1183    1184    1185    1186    1187    1188    ..   1188

© SecPod Technologies